Microsoft SharePoint Server Improper Input Validation Vulnerability (CVE-2026-32201).
Release Date: 13th April 2026
Impact : HIGH / CRITICAL
TLP Rating: Clear 
The Department of Communication and Digital Transformation (DCDT) through CERT Vanuatu (CERTVU), provides the following advisory.
This alert is relevant to Organizations and System/Network administrators that utilize the above products. This alert is intended to be understood by technical users and systems administrators.
What is it?
Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.
What are the systems affected?
The vulnerability affects older Microsoft Products including::
- Microsoft SharePoint Enterprise Server 2016 (x64-based System)
o Version affected from 16.0.0 before 16.0.5548.1003 - Microsoft SharePoint Server 2019 (x64-based System)
o Version affected from 16.0.0 before 16.0.10417.20114 - Microsoft SharePoint Server Subscription Edition (x64-based System)
o Version affected from 16.0.0 before 16.0.19725.20210
What does this mean?
Exploitation is network-based and does not require prior authentication.
Typical exploitation flow:
1.1. Target identification
- Attacker locates exposed SharePoint servers on internal or external networks.
2. Crafted request submission
- Malicious HTTP requests are sent with manipulated or malformed input fields. /li>
3. Bypassing input validation
- The system incorrectly interprets the attacker’s input as trusted data, allowing:
- Forged user identities
- Manipulated session or request context
- Unauthorized actions performed as another user or system component
4. Request or identity spoofing
- Attacker overwrites memory and executes code with SYSTEM privileges.
5. Worm propagation (common in real attacks)
- Malware automatically spreads to other vulnerable systems across the network.
Successful exploitation of this vulnerability may allow attackers to:
- Execute arbitrary code remotely with SYSTEM privileges
- Install malware or worm payloads
- Fully compromise affected systems
- Spread laterally across internal networks
- Disrupt services and cause large-scale outages
Mitigation process
CERTVU recommends the following:
Apply Microsoft Security Updates (Critical)
- Install the latest SharePoint Server security patches provided by Microsoft
- Ensure all farm servers are updated consistently
References
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- https://www.cve.org/CVERecord?id=CVE-2026-32201
- https://cwe.mitre.org/data/definitions/20.html
- https://learn.microsoft.com/en-us/officeupdates/sharepoint-updates
- Download advisory (English): Microsoft SharePoint Server Improper Input Validation Vulnerability (CVE-2026-32201).